Fundamental limits of secure device-to-device coded caching

We consider a device-to-device coded caching system, where each user is guaranteed recover its requested file and is simultaneously prevented from recovering any file it did not request. We jointly optimize the cache placement and delivery policies such that a set of end users are able to satisfy their requests while preserving the confidentiality constraints. We develop an upper bound utilizing secret sharing schemes and one-time pad keying as well as a lower bound on the required transmission rate. Numerical results indicate that the gap between the bounds vanishes with increasing memory size.

[1]  T. Charles Clancy,et al.  Fundamental Limits of Caching With Secure Delivery , 2013, IEEE Transactions on Information Forensics and Security.

[2]  Aydin Sezgin,et al.  Fundamental limits of caching in D2D networks with secure delivery , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[3]  Urs Niesen,et al.  Fundamental Limits of Caching , 2014, IEEE Trans. Inf. Theory.

[4]  Aylin Yener,et al.  Coded caching for resolvable networks with security requirements , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[5]  Giuseppe Caire,et al.  Fundamental Limits of Caching in Wireless D2D Networks , 2014, IEEE Transactions on Information Theory.

[6]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[7]  Vinod M. Prabhakaran,et al.  Fundamental limits of secretive coded caching , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[8]  Halim Yanikomeroglu,et al.  Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.

[9]  Ivan Damgård,et al.  Secure Multiparty Computation and Secret Sharing , 2015 .